Analysis
-
max time kernel
71s -
max time network
64s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23-01-2025 00:33
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133820660543415729" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 880 chrome.exe 880 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 880 chrome.exe 880 chrome.exe 880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe Token: SeShutdownPrivilege 880 chrome.exe Token: SeCreatePagefilePrivilege 880 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe 880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 4716 880 chrome.exe 81 PID 880 wrote to memory of 4716 880 chrome.exe 81 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4276 880 chrome.exe 82 PID 880 wrote to memory of 4592 880 chrome.exe 83 PID 880 wrote to memory of 4592 880 chrome.exe 83 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84 PID 880 wrote to memory of 4964 880 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://stemmcommunnity.com/1058429160251⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffefee6cc40,0x7ffefee6cc4c,0x7ffefee6cc582⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1772,i,1844444275788568297,13452276119411591790,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=1720 /prefetch:22⤵PID:4276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2096,i,1844444275788568297,13452276119411591790,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,1844444275788568297,13452276119411591790,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2244 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3124,i,1844444275788568297,13452276119411591790,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,1844444275788568297,13452276119411591790,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3672,i,1844444275788568297,13452276119411591790,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4960,i,1844444275788568297,13452276119411591790,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a70ea8abcf62ca20c1f4608d61f215a8
SHA13d214adaf51413cd3e504829697bd3cd35f71218
SHA2562e4fa61baa2b99d20a5cbf89b31662c8605e6bf93cc12f756133e8d8a0dae89d
SHA512d68ac2846ddd39002251f230a6f9adee32a93ce7d1c14f1fdba1553f356e7f7e8d90a8bc785d9d1706f674dccb90395196b82d2ade0e6d151ba2ee55db410c85
-
Filesize
480B
MD539e5f8323cc6c4d0447e6fb8f82c96b5
SHA1ef41fd4e925c83bc412c47c001993674f4236c88
SHA256327566fd529bb761904cb09e45fe2775d32ef8d5bddf25cbfd9050f268515cf9
SHA512d6da947748e8ea85c1958276acd457988abc2ee423694ccafad023108d150892c82957292a952dd7a02b4f8ca4ee1f7c3f477d4176b39a0e506f4d7a159ed1a9
-
Filesize
576B
MD517f6e8072fae1e728d7d35c030a20d7c
SHA169ffa2fb04873b7abf8c30c03b3324a8d07b4cbe
SHA2562bbd23d24cf5e8cfee6ac8898f0cbe37fd3ed263f888f18377d0b85aefe4fb3d
SHA512cbeeb9550bce67baf98cb912486d71c4b054a6ff11361ad842f751590c2ac53f90ff9b314efc58693ce67bceb43e875596e5ec51250417252ae5576803b5305d
-
Filesize
3KB
MD5040c2a1bb5303f9de40cc46a41c56ed7
SHA19d4c4820afc29cc9e2b646e33fd87d5d21457e86
SHA256f46d4a8dea3e6a57262bdd7dd7920777ea4071e6a05260297d482963698109ce
SHA512016ebfc2c2a64e74acef51b6867967ef9f66965d2804fa6f02a4254a70388f9d987d6a2f5670af76e02f2866282343330751f654930f8c9c7fae1e528b8c3974
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD59552deebd7e3c873abb5c705727b6269
SHA1ee001ecd3423942a8c8ff46422ecc2901f962d30
SHA256276fc44d207092f015506dd8f84be85367b6328faa809a2e9430d342d141fb3d
SHA512cb53172262fe7b34fe7e8026769165c490e0f518239184f0c7fff7391bf42adae6c64293b546f6e02bf2c17b1083e306c4b8036172507336856c91a34d9ed7f8
-
Filesize
1KB
MD5003b8dd60e88f85e9916fb7d411fa348
SHA1430f9dd4070782c96f86efdd571b864b82d8f046
SHA256eda1aa004a1a61d26f960fb5d6f9812c169ac39655ffcfafff19f6d5fe178d9b
SHA512da04ea923abb73de8684aaf1e53eeb969150aee67e221d584ddc94d5e1d7ef80d9b7d61af54ba3e59d14943f4ef53d0bd11deb477fed3bbbe92d86c2731394a8
-
Filesize
1KB
MD50909cc759f7ac57c8c9e8ea654935110
SHA159c4968aab0035bac1e8292d4ba1ef31180dedad
SHA2564a93643e4331aa9ca248bacc8edd4c610eb7f7185920ffbd703b4f7a2788a326
SHA5127f604f7294a18a5f67a8bd55f7987ee476d3171d5e888438294d13cd537ca45f472b3e66671dd39adbdfa49f95a40ca04a396ebc432481b01ea3a425775c31a9
-
Filesize
9KB
MD5a3fbe6578a9ea071afb075e6f17c351b
SHA17ea0a2267c6af8967a59b0d7c69106af0405f0be
SHA2560003c7fba5ac08c1f0dfcc5a5acfd19a83d54adda67368412307173f49210d72
SHA51267bf46667916b405b4ffcf9483554cedc04cc6022919bd08c0e5602eed7875c00110614707e99392efa58794e652492a5305b6da591d7398efe73b94f73e06a5
-
Filesize
9KB
MD502b04b0251c5109896604b47eff0d147
SHA19f39d1fe61dbccea9a711485c90ec9da1eb2cd67
SHA256bbb8d2a35522ae60ff9f35a3c20bcbf91243773888ad249bbeea9e5eb805d8d6
SHA5124ae6a5c59d6b6cae0b3ed82470e3499f8d53067fa82668fe8028dba3f13464b3882fb1585c9252fa7603ae5497744b109a468d541a667759cf55fff331b284fd
-
Filesize
9KB
MD5c7679909d9e423549b5a0af72106b381
SHA10c874a368dbca15d76e4cf16a83e7c1d22c1de0a
SHA256c4585be6e23d1c655f7a766cb63a607b65882e9901a2e68062ec9a4ab8f80f2d
SHA5120feca1863ab899206e43d3c048c66ef4057ad3e14a4e8039cfd80536267e7984cc70591adaafb3d79e1019edd83f730997a9650e1e6cfeb76e7c4babfb8e4790
-
Filesize
9KB
MD5c1fd5538760359604b6e63a24778511b
SHA16b430a242f29bb5642c248a0acf9e098f890f24d
SHA2566bc066791d473c2d2e99a53c0258955cf621dd2e96e6782efae158059f5c1edd
SHA512120a38e6f0ae08c37bd2540e7090f0c2b66b8f8a538a19aead2e0d2758822928cc79fcb365dfd744bb0e443c87b317b00f91d153dc3016f68eda839776ea1ac4
-
Filesize
9KB
MD53b6c191593a3e02e5cf33ba1366f0227
SHA14fa12dbc45244b5478084dbea6032be01922eb94
SHA2569cfa27ef88542963f671fca1ba7d44a2a684f248ea7d70abdd6cc8b5076e90bb
SHA5126ae3f17abb031e3b9e071e1b947855881b8e59ea4b90b2077da7a3b01d18d6846249d88c2247e2de5ac361d88337f6d0d340f5d982f28016da277c3e8d5274b2
-
Filesize
118KB
MD5cd347cfa52c0a4dcae4f3b6506bc879e
SHA193535e9c4e82d6ceb3bdc4247e2530be28946884
SHA2563e68ef0508fde62481d71c7b926de30f2fb608a8e904934944398b2bff2f0de9
SHA512236e9c6bc040238b81c1592cbcbc4453e34b38c21a958c925390aa4b03e12969fc698c845c1beba26a3fed9cb36f89b2706fee9fb28ec996c918931e9689d192
-
Filesize
118KB
MD5dd0fefc2be85b3e5e742cf2e9e5dc727
SHA1fb936b60e78b4cc3db023629b5f7a98d27668135
SHA25632c2a70dfe00a79ce02a32c4ae52714bcb6a0124885ef2f6163241ad58d5eb14
SHA5120aa070890dbe97ab81ec92c64edc42721a2105d0c9fcc63c0d5cd360741c279768932cdc636e6eed40fe1ed8ed51f39944eeafc03e3a25e9822ee2959d093ef2